Affordable Access

Publisher Website

Log management for effective incident response

Authors
Journal
Network Security
1353-4858
Publisher
Elsevier
Publication Date
Volume
2005
Issue
9
Identifiers
DOI: 10.1016/s1353-4858(05)70279-8
Keywords
  • Features
Disciplines
  • Criminology

Abstract

Log file correlation is related to two distinct activities: Intrusion Detection and Network Forensics. It is more important than ever that these two disciplines work together, and in cooperation, to avoid points of failure. This article presents an overview of log analysis and correlation, with special emphasis on the tools and techniques for managing them within a network forensics context.

There are no comments yet on this publication. Be the first to share your thoughts.